A brief survey on secure multi-party computing in the presence of rational parties

被引:0
|
作者
Yilei Wang
Tao Li
Hairong Qin
Jin Li
Wei Gao
Zhe Liu
Qiuliang Xu
机构
[1] Ludong University,School of Information and Electrical Engineering
[2] Fujian Normal University,Fujian Provincial Key Laboratory of Network Security and Cryptology
[3] Guangzhou University,School of Computer Science and Educational Software
[4] Ludong University,School of Mathematics and Statistics Science
[5] University of Luxembourg,Laboratory of Algorithmics, Cryptology and Security
[6] Shandong University,School of Computer Science and Technology
关键词
Game Theory; Nash equilibrium; Intelligent agents; Rational secret sharing; Rational secure multi-party computing;
D O I
暂无
中图分类号
学科分类号
摘要
Intelligent agents (IA) are autonomous entities which observe through sensors and act upon an environment using actuators to adjust their activities towards achieving certain goals. The architectures of agents have enormous potentials when they are applied into critical systems, where agents choose actions between working with their own and cooperating with others. Rational utility-based agents choose actions to maximize their expected utilities. Rational secure multi-party computing (RSMPC) means secure multi-party computing (SMPC) in the presence of rational utility-based agents. Here, we call them rational parties. In this paper certain goals of rational parties are maximizing their utilities. The introduction of rational parties considers the incentives in executing protocols. The security definitions under rational framework can better demonstrate the executing environment of real protocols. Furthermore, rational two-party computing removes some impossibility in traditional two-party computing, such as fairness. This paper represents the research status of RSMPC and some typical protocols. The advantages and disadvantages of previous rational SMPC protocols are discussed here. As an emerging field, there are still lots of open problems in RSMPC, such as communication channels, utility assumptions and equilibrium notions etc.
引用
收藏
页码:807 / 824
页数:17
相关论文
共 50 条
  • [1] A brief survey on secure multi-party computing in the presence of rational parties
    Wang, Yilei
    Li, Tao
    Qin, Hairong
    Li, Jin
    Gao, Wei
    Liu, Zhe
    Xu, Qiuliang
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2015, 6 (06) : 807 - 824
  • [2] Social rational secure multi-party computation
    Wang, Yilei
    Liu, Zhe
    Wang, Hao
    Xu, Qiuliang
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2014, 26 (05): : 1067 - 1083
  • [3] Rational protocol of quantum secure multi-party computation
    Zhao Dou
    Gang Xu
    Xiu-Bo Chen
    Xin-Xin Niu
    Yi-Xian Yang
    [J]. Quantum Information Processing, 2018, 17
  • [4] Rational protocol of quantum secure multi-party computation
    Dou, Zhao
    Xu, Gang
    Chen, Xiu-Bo
    Niu, Xin-Xin
    Yang, Yi-Xian
    [J]. QUANTUM INFORMATION PROCESSING, 2018, 17 (08)
  • [5] Secure Multi-Party Computation for Machine Learning: A Survey
    Zhou, Ian
    Tofigh, Farzad
    Piccardi, Massimo
    Abolhasan, Mehran
    Franklin, Daniel
    Lipman, Justin
    [J]. IEEE ACCESS, 2024, 12 : 53881 - 53899
  • [6] Secure Multi-Party Computation
    Bayatbabolghani, Fattaneh
    Blanton, Marina
    [J]. PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 2157 - 2159
  • [7] Secure Multi-party Computation Using Virtual Parties for Computation on Encrypted Data
    Pathak, Rohit
    Joshi, Satyadhar
    [J]. ADVANCES IN INFORMATION SECURITY AND ASSURANCE, 2009, 5576 : 412 - +
  • [8] Brief Announcement: Secure Data Structures based on Multi-Party Computation
    Toft, Tomas
    [J]. PODC 11: PROCEEDINGS OF THE 2011 ACM SYMPOSIUM PRINCIPLES OF DISTRIBUTED COMPUTING, 2011, : 291 - 292
  • [9] Ruyi: A Configurable and Efficient Secure Multi-Party Learning Framework with Privileged Parties
    Song, Lushan
    Wang, Zhexuan
    Lin, Guopeng
    Han, Weili
    [J]. IEEE Transactions on Information Forensics and Security, 2024, 19 : 10355 - 10370
  • [10] Blockchain-assisted Verifiable Secure Multi-Party Data Computing
    Pei, Hongmei
    Yang, Peng
    Du, Miao
    Liang, Zengyu
    Hu, Zhongjian
    [J]. COMPUTER NETWORKS, 2024, 253